Perimeter Penetration Tests
- Reconnaissance - Gather details of the network.
- Network Scanning
- Port and vulnerability scans.
- Locate entry points that can be targetted.
- Penetration - find exploitable vulnerabilities.
- Comprehensive report
- Report identified vulnerabilities.
- Propose options to resolve them.